This is a continuation of application 08/270,971, filed Jul. 5, 1994, now abandoned.
    
    
    FIELD OF THE INVENTION
    The present invention deals with burst size optimization for any projectile-based system designed to defeat multiple targets presenting eminent threats. An optimum probability of defeating the threats is achieved by scheduling the number of rounds needed to kill each target. The invention utilizes logic steps and routines which are integrated with fire control computers, target acquisition radar and communication systems to enable assessment of eminent threats and assign responsive measures to defeat the threats.
    SUMMARY OF THE INVENTION
    The gun salvo scheduler is a computer based target information acquisition, threat assessment and appropriate response initiating system which maximizes a cumulative probability of kill against the target and schedules rounds accordingly. The salvo scheduler utilizes a closed looped routine to schedule rounds so that the predicted probability of kill is maximized. The routine, iteratively, compares the preferred threshold of probability of kill and adjusts it based on availability of rounds and limitations of response time. Specific advances, features and advantages of the present invention will become apparent upon examination of the following description and drawings dealing with several specific embodiments thereof.
    
    
    BRIEF DESCRIPTION OF THE DRAWINGS
    1. FIG. 1 is a flow chart in which the routine assesses the population of the threat; the availability of rounds; the fire rate or time between rounds; the probability of killing the threat and determines the best solution, by determining the number of rounds to fire at each target.
    2. FIG. 2 is a flow chart showing how the optimal burst routine fits in with the other functions in a fire control computer to detect, track, queue, schedule, and engage incoming targets
    3. FIG. 3 is a block diagram showing the interaction of the salvo scheduler with other units and the communication thereof.
    4. FIG. 4 is a depiction of how the salvo scheduler protects assets by attacking in-coming threats.
    
    
    DESCRIPTION OF THE PREFERRED EMBODIMENT
    The present invention provides a computer integrated algorithm which maximizes the likelihood of surviving a missile/aircraft attack against a high value asset defended by a gun weapon system.
    Referring now to FIG. 1, a flow chart is shown in which algorithmic logic steps are set. Probability of kill (PK) and target count (TARG CNT) 10 initiates the target counter and subsequent logic steps and routines. Initially the target count is set at zero. This communicates with the Bullet and Target count logic step 12. The bullet count is set at zero, initially. Consecutive logic step 14 sets bullet count, first motion time and gun delay time. Further, logic step 14 sets first motion time equal to the sum of start fire, gun delay time and time between bullets. Logic step 16 compares and confirms if first motion time is greater than last motion time or target count. If the response to logic step 16 is affirmative, the routine advances to logic step 18 which decreases the desired PK hurdle by an established quantity. The target count is set to zero and when the probability of kill is equal to unity, the result is directed back into logic step 12. If the answer to logic step 16 is in the negative, the routine proceeds to logic step 24. Logic step 24 includes intercept range calculations; probability of kill for a single shot (SS) calculations as well as calculations for cumulative probability of kill. Consecutive logic step 26 inquires if the cumulative probability of kill is greater than the probability of hurdle or if the bullet count is greater than the maximum burst size allowable. If the answer to any of these is negative the logic routine reverts behind logic step 14. If the answer is positive the routine proceeds to logic step 28 to set the start fire time which is equal to first motion time. Subsequently, the routine advances to logic step 30 wherein the system checks if the target count is equal to the maximum targets observed. If the target count does not yield the maximum number of targets, the logic reverts back to logic step 12. On the other hand, if the target count yields the maximum number of threat targets, the routine advances to logic step 32 wherein the system returns the number of bullets to fire at each threat. Logic steps 10 through 32 discussed hereinabove, comprise the logical sequence and steps required to set up probability of kill and eminent threat target count. In subsequent discussions, as in FIG. 2, logic steps 10 through 32 will be referred to as "Routine A" 56.
    Referring now to logic steps of FIG. 2, the unique aspects of Routine A 56 are shown integrated with other logic as shown. More specifically, logic step 38 sets the target search. Consecutive logic step 40 interrogates if a target has been detected. If no target detection has been noted the routine is directed back to target search logic step 38. However, if a target has been detected the routine is directed to logic step 42 wherein a target track file is created. The routine proceeds to logic step 44 which determines whether the new target should be considered part of the current raid. If the new target is not part of the current raid, it is placed in a queue for future scheduling and is set under logic step 46. If a new target is considered part of the current raid the routine proceeds to logic step 52 to decide if a maximum burst size could be launched at each target. If a maximum burst size could not be launched at each target the system reverts to Routine A 56 (See FIG. 1) and accordingly, the burst size for each target is determined. In the alternate, if a maximum burst size could be launched at each target, the system proceeds to logic step 58 where the open fire time is determined. Consecutive logic step 60 determines the time to open fire. Upon confirming to open fire the routine proceeds to logic step 66 where fire is opened on the scheduled threat. If the time is not ripe to open fire the routine proceeds to logic step 68 which checks if new track files have been created. In the absence of new track files the routine reverts back to logic step 60 as shown. Further, it should be noted that logic step 60 is communicative with Routine A 56, such that the burst size for each target is determined simultaneously with the proposal to whether it is time to open fire. Logic step 66 advances to logic step 70 where the current raid is checked to be the last threat in the current raid. If the response is negative, the routine goes back to logic step 68. In the alternate, if the response is positive, the routine advances to logic step 72 where the existence of threats in the queue is checked. If there are threats in the queue, the routine advances to logic step 52. On the other hand, if there are no threats in the queue, the routine goes back to logic step 38 where a target search and consecutive logic are initiated.
    Referring now to FIG. 3, a communicative system comprising fire control computer 74, gun weapon system and salvo scheduler 76, target acquisition radar 78 and communication link 80 are shown.
    FIG. 4 shows the general and conceptual operation of the present invention. In-coming threats or missiles 84 and 84' are shown directed at assets 86. Gun system 88, fires rounds 92 and 92', using the salvo scheduler of the present invention to defeat the incoming threats.
    The description hereinabove relates to some of the most important features which set and determine, inter alia, the structural parameters of the present invention. The operations of the present invention, under a best mode scenario, are discussed hereinbelow.
    As disclosed in the logic flow chart of FIG. 1, (Routine A) one of the most important aspects of the present invention includes the ability to set and calculate the burst size directed to each threat thereby maximizing probability of eliminating all threats. Primarily, target acquisition radar 78 provides input to gun weapon system and salvo scheduler 76 that a threat target has been identified. With specific reference to FIGS. 2 and 3, target search in logic step 38 communicates with target acquisition radar 78 via communication link 80. Once the presence of a target is confirmed, a target track file is created under logic step 42. Further, the target is classified as either a part of the current raid or a non-current raid target under logic step 44. If the new target is not part of the current raid, the data is placed in queue for future scheduling under logic step 46. The routine proceeds to allocate a maximum burst size per target if the threat is identified as part of the current threat. This is executed under logic step 52. However, if the maximum burst size cannot be launched at each target, the logic flow advances to Routine A, logic step 56, to determine the burst size required to defeat each target. Further, gun weapon system and salvo scheduler 76 communicate with fire control computer 74 to determine the open fire time 58. Thence, the routine proceeds to logic step 60 to confirm if it is time to open fire. If the system's readiness to open fire is confirmed, fire is opened on the scheduled threat, under logic step 66. Further, for every threat being fired upon, the routine confirms if this is the last threat in the current raid under logic step 70. When the last of the current threats is confirmed, the routine proceeds to check if there are any threats in the queue under logic step 72. Continuous communications with target acquisition radar 78 provide information on both queued and current threat data. If the last of the current threats is dealt with, and there are no threats resident in the queue, the routine goes back to logic step 38 to search for new targets.
    Referring now to FIGS. 3 and 4, the overall system function is represented. Here, gun weapon system and salvo scheduler 76 is incorporated in gun system 88. Further, fire control computer 74 is also incorporated in gun system 88. Gun system 88 communicates with target acquisition radar 78 via communication link 80. In-coming threats 84 are detected by radar 78 and the information is communicated to salvo scheduler 76 in gun system 88. The salvo scheduler 76 goes through the iteration and logic steps disclosed in FIGS. 1 and 2 and discussed hereinabove. The salvo scheduler 76 of the present invention commands the fire control against the scheduled threat and rounds 92 are deployed to engage threats 84. More specifically, the salvo scheduler of the present invention prioritizes threats according to most eminent threat arrival. Thus, the gun system engages threats 84 first. A specific number (burst size) of rounds 92 are allocated and deployed to destroy the eminent threats 84. Further, gun system 88 switches over to in-coming threats 84' (refer to phantom lines) to engage these threats on a second priority or temporally sequenced basis. Thus, the salvo scheduler determines the open fire time and allocates the optimum number of rounds to defeat a threat. More specifically, the present invention enables the optimization of probability of kill based on threat characteristics. Accordingly, the protection of assets 86 is significantly enhanced by the unique features and functions resident in the present invention.
    While a preferred embodiment of the gun salvo scheduler has been shown and described, it will be appreciated that various changes and modifications may be made therein without departing from the spirit of the invention as defined by the scope of the appended claims.